educational

Oh, It’s SoBig!

Are Viruses, Worms, Trojan Horses, and Spam the new Four Horsemen of the Apocalypse? Most people love drama, especially when it doesn't take too much of a personal toll on them, and hackers, anti-virus companies, service providers, and individual users are no exception...

If it weren't for things like sobig—the latest Internet virus to gain international infamy — what would we talk about? Imagine — we might actually be forced to face some real issues. As sobig filled up mailboxes around the world, angry businessmen began furiously tapping their feet and counting up the virtual pennies they were losing to email inefficiency. While a few large Internet businesses were legitimately crippled, the reality is that most of us didn't suffer significantly. Perhaps you had to spend 30 seconds deleting spam before you could read your email. Irritating, but hardly worth a panic.

Media hypsters would like you to believe that the four horsemen of the Apocalypse have finally arrived: Viruses, Worms, Trojan Horses, and Spam. This cartoonish quartet is constantly hailed as the bringer of doom, but somehow we always seem to defeat them. It's like a huge virtual cartoon being played out as entertainment for a bored Western world. While people in under-developed countries struggle to find water or to fight real viruses without medical care, we're all busy whining that spam and telemarketers ruin our lives.

Will viruses and worms topple the Internet? No. The Internet is like a huge living entity composed of many independent systems working in concert. Like biological viruses, computer viruses can attack and weaken various systems. They may even bring the whole damn thing to its knees eventually—like a bad case of the flu—but eventually the system will repair itself. This is not to say that we should have a pacifist attitude. It's very important for people to speak out against viruses and other virtual maladies, to fight them and create cures for them. But it's also important for hackers and hobbyists to engineer new viruses and to exploit every new weakness they can find. These constant attacks protect us by keeping us on guard. Like the common colds that afflict us all from time to time, the occasional email virus serves to stimulate our virtual immune system. If the manufacturers of virus software weren't constantly scrambling to address new threats, their technological edge would dull and hacker attack would become a real threat. We should treat hackers like intellectual, flash-in-the-pan celebrities, not like arch criminals.

Hackers, anti-virus companies, service providers, and individual users are all intertwined in a deeply symbiotic relationship. It would be wonderful to discard all the melodrama of each big virus "crisis" in favor of a more rational view, but that seems unlikely. Most people love drama, especially when it doesn't take too much of a personal toll on them. It's pure Schadenfreude to hear about corporations suffering or to talk about hackers and the ever imminent "email apocalypse." It may be that this drama plays as important roll in giving the whole symbiotic relationship some momentum, like the catalyst for a chemical reaction.

So should you be afraid of these four horsemen? No. But if it helps to motivate you into protecting yourself and staying informed, go ahead and be afraid. It's okay. I'm here for you.

What’s Next?
Have we seen the worst that malicious code writers can muster? Hardly. Here’s a glimpse at some of the enemies who will make our online future more dangerous:

Chimeras: Expect to see viruses that can jump from one platform to another—in the same way that SARS jumped from rat to bird to human. Simile.D was one of the first simple lab viruses to affect both Windows and Linux, but further advances in this area will happen with unexpected speed.

Mutations: Although it's been used already, virus authors will continue to incorporate varying levels of mutation into their creations. As a virus spreads, most offspring will be very similar, allowing them to be digitally profiled and quarantined by anti-virus programs. However, a portion of the offspring will feature radical mutations and adaptations.

Anti-Heuristics: As anti-virus programs improve their heuristics—their ability to identify previously unknown viruses based on their behaviors or qualities—expect to see viruses that can outthink and even exploit these engines. The more detections systems grow in complexity, the more vulnerable they themselves become.

Despite the best anti-virus protection in the world, the greatest weakness is always going to be human curiosity. If the person who disseminates a virus in an email — the most crude and obvious mode of infection — can just manage to get inside your head, they can tempt you into opening almost anything...

Copyright © 2024 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More Articles

opinion

How to Halt Hackers as Fraud Attacks Rise

For hackers, it’s often a game of trial and error. Bad actors will perform enumeration and account testing, repeating the same test on a system to look for vulnerabilities — and if you are not equipped with the proper tools, your merchant account could be the next target.

Cathy Beardsley ·
profile

VerifyMy Seeks to Provide Frictionless Online Safety, Compliance Solutions

Before founding VerifyMy, Ryan Shaw was simply looking for an age verification solution for his previous business. The ones he found, however, were too expensive, too difficult to integrate with, or failed to take into account the needs of either the businesses implementing them or the end users who would be required to interact with them.

Alejandro Freixes ·
opinion

How Adult Website Operators Can Cash in on the 'Interchange' Class Action

The Payment Card Interchange Fee Settlement resulted from a landmark antitrust lawsuit involving Visa, Mastercard and several major banks. The case centered around the interchange fees charged to merchants for processing credit and debit card transactions. These fees are set by card networks and are paid by merchants to the banks that issue the cards.

Jonathan Corona ·
opinion

It's Time to Rock the Vote and Make Your Voice Heard

When I worked to defeat California’s Proposition 60 in 2016, our opposition campaign was outspent nearly 10 to 1. Nevertheless, our community came together and garnered enough support and awareness to defeat that harmful, misguided piece of proposed legislation — by more than a million votes.

Siouxsie Q ·
opinion

Staying Compliant to Avoid the Takedown Shakedown

Dealing with complaints is an everyday part of doing business — and a crucial one, since not dealing with them properly can haunt your business in multiple ways. Card brand regulations require every merchant doing business online to have in place a complaint process for reporting content that may be illegal or that violates the card brand rules.

Cathy Beardsley ·
profile

WIA Profile: Patricia Ucros

Born in Bogota, Colombia, Ucros graduated from college with a degree in education. She spent three years teaching third grade, which she enjoyed a lot, before heeding her father’s advice and moving to South Florida.

Women In Adult ·
opinion

Creating Payment Redundancies to Maximize Payout Uptime

During the global CrowdStrike outage that took place toward the end of July, a flawed software update brought air travel and electronic commerce to a grinding halt worldwide. This dramatically underscores the importance of having a backup plan in place for critical infrastructure.

Jonathan Corona ·
opinion

The Need for Minimal Friction in Age Verification Technology

In the adult sector, robust age assurance, comprised of age verification and age estimation methods, is critical to ensuring legal compliance with ever-evolving regulations, safeguarding minors from inappropriate content and protecting the privacy of adults wishing to view adult content.

Gavin Worrall ·
opinion

Account-to-Account Payments: The New Banking Disruptor?

So much of our industry relies upon Visa and Mastercard to support consumer payments — and with that reliance comes increased scrutiny by both brands. From a compliance perspective, the bar keeps getting raised until it feels like we end up spending half our time making sure we are compliant rather than growing our business.

Cathy Beardsley ·
profile

WIA Profile: Samantha Beatrice

Beatrice credits the sex positivity of Montreal for ultimately inspiring her to pursue work in adult entertainment. She had many friends working in the industry, from sex workers to production teams, so it felt like a natural fit and offered an opportunity to apply her marketing and social media savvy to support people she truly believes in and wants to see succeed.

Women In Adult ·
Show More